UPDATE April 2007
Total Page:16
File Type:pdf, Size:1020Kb
AT&T Consultant/Vendor Sales Group UPDATE April 2007 k a r i ’ s c o r n e r New Opportunities i n s i d e . What a busy start to the year! Our merger integration with BellSouth continues to expand our business and consumer solutions portfolio. Local to 3 global, we remain dedicated to providing the most complete, secure and reliable networks for your Zombie Networks business success. –Jerry Hinek In such a fast-changing industry, access to the latest information is essential. Your Consultant Liaison Managers certainly take the lead in keeping you informed, and we hope you also 6 find value in this publication. And this year we are delighted to add to that communications stream by offering you the opportunity to attend AT&T BusinessDirect® FOCUS seminars! FOCUS is a non-profit AT&T business user group that –Robert Sloan has grown steadily by providing an active forum for communications users and providers. FOCUS programs and events provide the professional advantage members need to stay on top of today’s industry 8 evolution. Earlier this year, we had a very successful FOCUS chapter meeting in Data with David Anaheim, California. Consultant Robert Harris from Communications –Tom David Advantage said the event was “a great example of how the CLP program keeps me (and my team members) informed and supported, 12 and ethically leverages the relationship that consultants have with clients.” One Laptop per Also in Anaheim, consultants were invited to attend our Networking Child Leaders Forum. This full-day event gave consultants, customers and AT&T account teams the opportunity to discuss the critical business –Nancy Grover continuity and network security issues businesses face today. Participants were able to observe as the AT&T Network Disaster Recovery (NDR) team conducted a test of our business continuity processes in the event of a network outage. Consultant Roy Walker, president of Walker Consulting LLC, remarked, “I was very impressed with the event and appreciate knowing about these vital services.” Continued on page 5 in this issue... 1 Kari’s Corner by Kari Aguinaldo AT&T Customer Service 3 Numbers Zombie Networks by Jerry Hinek 6 Pre-Merger SBC Areas: AT&T BusinessDirect® by Robert Sloan California Sales & Billing Repair 8 Small Business 1-800-750-2355 611 or Toll-free Data with David by Tom 1-800-750-2355 David Medium Business 1-800-891-1800 611 or Toll-free 11 1-800-332-1321 CPUC Considers Area Code Changes Nevada Sales & Billing Repair 12 Business/Consumer 1-800-288-2020 1-877-469-2355 One Laptop per Child – Bridging the Digital Divide Southwest Business by Nancy Grover Sales 1-800-499-7928 14 Billing 1-800-559-7928 AT&T Yellow Pages Mirrors Societal Changes Repair 1-800-286-8313 15 Midwest Small Business Small Business AT&T Tops All Competitors in Sales & Billing Repair Leading Analyst’s U.S. Carrier Assessment Indiana 1-800-660-3000 1-800-727-2273 Wisconsin 1-800-660-3000 1-800-727-2273 Illinois 1-800-660-3000 1-800-727-2273 Ohio 1-800-660-3000 1-800-727-2273 UPDATE Editor Michigan 1-800-660-3000 1-800-727-2273 Elaine Tipping Español 1-800-426-2902 [email protected] East (CT) Sales & Billing Repair Contributors Business 1-800-448-1008 1-800-922-4646 Kari Aguinaldo Tom David Pre-Merger AT&T Mass Market Areas: Nancy Grover Jerry Hinek Local and Long Distance Service: 1-800-222-0300 Robert Sloan AT&T CallVantage Service: 1-866-596-8464 AT&T Worldnet and DSL Service: 1-800-WORLDNET (1-800-967-5363) Layout & Design Lillian Cram AT&T MultiMedia Productions AT&T Alascom (Alaska): Business Services: 1-800-955-9556 Publisher AT&T West Business Communications Services Sales Operations 2 j e r r y h i n e k Zombie Networks One of the viruses are purposefully designed, primary tools in the written and modified. Those writing the cyber wars waged viruses have goals in mind, and their against each of us skill in writing the virus determines how A zombie is every day is the successful they will be in achieving their a personal zombie. A zombie is goals. For both kinds of virus there are a personal precautions you can take before computer computer whose infection, and things you can do after whose processing time and infection, to lessen the pain or hasten capabilities are taken over anonymously the recovery. The last half of this article processing and remotely by a hostile stranger, for discusses protecting yourself. time and personal enrichment, at the expense of the computer owner. Self-Replication capabilities It’s just a technical problem to write a A zombie network can consist of computer virus to infect a computer. In are taken thousands of zombies controlled by one some ways it’s no different than writing over person. A zombie can be used to attack any other software except that the other computers, to send spam or to person who owns the target computer anonymously disrupt other normal activities. If you may have to be tricked into allowing the and remotely haven’t taken care to protect yourself, virus into the computer. your own computer could be a zombie. by a hostile Early viruses spread when people Zombies are an evolutionary by- shared infected 3.5 inch diskettes. This stranger, for product in the development of computer process took time, and viruses spread personal viruses. The first viruses were written slowly. The cycle would start with a virus simply to be disruptive. New technology, writer infecting a diskette that had some enrichment, new computers and new virus attractive file or game or other software at the techniques, along with the profit that an unknowing person might want to potential, lead to the creation of viruses run. Then the virus writer would give the expense of that create zombies. diskette to someone who would load the the Computer viruses have always had infected diskette into a PC and infect it. three main components: infection, self- Then the infected PC would infect other computer replication and payload. diskettes that were passed around and owner. loaded into other PCs. Infection Just as an organic virus infects human The Internet has enabled viruses to beings, a computer virus infects its spread almost instantly around the victims in the course of normal globe. They can hit and infect a activities. Shaking hands or flying on an vulnerable computer, replicate airplane with a sick person can lead to a themselves and attack other computers cold or flu. Having your computer many times a second. Even with good connected to the Internet, opening email anti-virus software, a new virus may or surfing infected websites can lead to infect a computer before updates are a computer virus. available to clean the virus or to protect uninfected computers. The virus infection takes place without any direct awareness by the infected Payload person or system. We wouldn’t choose So why do virus writers write viruses? to become infected or to have our Motivation is personal, and virus writers computers infected. have different motives. Early viruses Of course, where this analogy breaks were written for three primary purposes: down is that while viruses in humans are for the challenge, to disrupt or annoy a a product of natural selection, computer Continued on page 4 3 Continued from page 3 When a computer is infected it may person, and to destroy the information contact a computer owned by the on a computer. That was the limit of the malicious attacker anywhere in the technology at the time. world and ask for further instructions. The attacker then loads more malicious As virus writers developed techniques software. With enough computers under to exploit technological advances and to control, the zombies become a powerful stay ahead of the anti-virus industry, tool for attack. they got better at spreading their viruses. They discovered ways to profit, Protecting Yourself and they got greedy. Some may still Protecting your computer and write viruses for the challenge, but most network from hostile attacks is one of Some may viruses are written not to destroy or to the areas in life where enlightened self- annoy, but to steal computer capabilities interest aligns with the common good. If still write remotely, and to cash in. you protect your computer you can’t viruses for Zombie networks can be made to easily be attacked, and you won’t likely send out newer viruses or spam and have your computer attacking others. If the phishing that generate great profits if we all take responsibility for our own challenge, even a small number of recipients security we will get the most benefit respond. These networks can also be from our investments in our computers. but most bought and sold or rented to others. Software Updates viruses are How a Computer Becomes a Both operating systems and written not Zombie application software normally contain To stay ahead of the anti-virus weaknesses in their designs that hackers to destroy or industry, virus writers incorporate hacker exploit. Oversight or lack of training on to annoy, but techniques and tools. In fact, a lot of the part of the software developers viruses are merely automated hacking contributes to the problem, as does the to steal plus the ability to replicate. fact that operating systems and applications are written by teams of computer Hackers look for vulnerabilities in people, are very complex, and can operating systems and common capabilities contain millions of lines of code.